Preview

Access Control

Powerful Essays
Open Document
Open Document
2183 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Access Control
| Access Control | Course Project – SEC330 | | Kristen E. Mosuch | 2/10/2013 |

Table of Contents:
Introduction………………………………………………………………………………………………………………………………Page 2
Risks and Threats Overview………………………………………………………………………………………………………Page 2
Risks Associated with Access Control………………………………………………………………………………………..Page 3
Methods of Access Control……………………………………………………………………………………………………….Page 4
Government Regulations…………………………………………………………………………………………………………..Page 7
Conclusion…………………………………………………………………………………………………………………………………Page 8
Bibliography………………………………………………………………………………………………………………………………Page 10

Access Control *
Introduction:
Physical security breaches can be detrimental to any company. Adequate access control is imperative to insure the protection of data, assets and employees. In a post 9/11 America, the need for higher physical security standards and more stringent access control systems remains a critical piece of corporate security plans. Access control systems not only keep out unauthorized individuals, but prevent unauthorized access to data and equipment, and help deter and prevent unauthorized disclosure of information. “In traditional physical security, locks, security alarms, access controls, and surveillance video define the primary hardware systems.” (Martin & Bakhto). This paper examines the significance of physical access controls and their purpose and place in the corporate security program.
Risks and Threats Overview:
There are many risks and threats associated with corporations and the protection of their assets and data. Some of these threats include, terrorism (both domestic and foreign), cyber threats, armed intruders, espionage, bomb threats and data spills. Any one of these threats, if allowed to become a reality, could easily be the downfall of a corporation, depending on the severity of the threat. “Physical security breaches can result in more issues for an organization than a worm attack. Loss of data,



Bibliography: Corporate ID Card & Identity Management Systems. (2013). Retrieved from ISG (Identification Systems Group): http://www.identificationsystemsgroup.com/corporate Cambone, S. A. (2006). NISPOM (National Industrial Security Program Operating Manual). Washington, DC: United States Department of Defense. Retrieved from http://www.dss.mil/documents/odaa/nispom2006-5220.pdf Giannoulis, P., & Northcutt, S. (2007, January 25). Security Laboratory: IT Managers - Safety Series. Retrieved from Sans Technology Institute: http://www.sans.edu/research/security-laboratory/article/281 Homeland Security News Wire. (2012, June 11). Homeland Security News Wire. Retrieved from Perimeter Protection: http://www.homelandsecuritynewswire.com/dr20120611-cast-lighting-s-led-perimeter-light-wins-industry-innovation-award Martin, T., & Bakhto, A. (n.d.). Physical Access Controls. Retrieved from Global Information Assurance Certification: http://www.giac.org/cissp-papers/282.pdf

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    The following document outlines Richman Investments security measures for IT infrastructure. There are many components that make up the Richman Investments network, and so there should be a multi-layered security solution to protect it. The server room has been located in the central part of the building, and will be physically protected by electronic door locks with keypad combination access. There are a limited number of personnel who will have access to this room in order to decrease the potential for tampering. Each of these personnel will have their own access code, and a digital log will be kept of all access.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Finally, the system/application domain would require virtual testing of everything before any implementation, hardening of all servers, and keeping up with patches and updates regularly after testing has been completed. Some of the more efficient ways to implement better access controls in a company would start with the proper level of authorization policies including physical controls for facilities. The authorization policy would appropriate entry system access controls that specify what areas are to be locked at all times and what type of locking mechanism should be implemented. It would also include the implementation of secondary locks on specific equipment and storage cabinets…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Telecoms has not been updated in 15 years and is not integrated with customer service database to improve call management efficiency…

    • 782 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Olzak, T. & Bunter, B. (2010, May 07). Security basics - components of security policies. Bright…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    References: Kim, D., & Solomon, M. G. (2012). Fundamentals of Information Systems SecuritY. Sudbury: Jones & Bartlett Learning.…

    • 651 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Project Part 1

    • 1209 Words
    • 4 Pages

    Guil, F. (2003, April). Computer rooms-meet the physical security measures . In GIAC.com. Retrieved March 15, 2014, from http://www.giac.org/paper/gsec/2892/computer-rooms-meet-physical-security-measures/104866…

    • 1209 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Confidentiality, integrity, and availability (CIA) concepts  Layered security solutions implemented for the seven domains of a typical IT infrastructure …

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Good Essays

    Chapter 9 ISS

    • 620 Words
    • 3 Pages

    9 True or False: Access control is a mechanism for accomplishing confidentiality, integrity, authentication, and nonrepudiation.…

    • 620 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Security is a compelling concern for business and employees. Employers need to establish that they carry out complete risk assessment and address security issues by implementing required security systems. Physical security system is a fundamental component of an establishment, which protects a several aspects such as building security, theft, vandalism and falsification of records. Therefore, organizations and companies need to highly aware of to protect their physical assets. The foundation of a competent security management can prevents such risk like discovering solutions, authorization, and controlling employee’s activities. As a result, organizations can ensure the safety and protection of employees and property.…

    • 1377 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    ISP Survey

    • 1455 Words
    • 5 Pages

    References: Cichonski, P., Millar, T., Grance, T., Scarfone, K. (2012). NIST SP 800-61: Computer Security Incident Handling Guide. National Institute of Standards and Technology. Rev. 2. Retrieved from National Institute of Standards and Technology.…

    • 1455 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    TM 9 1015 252 10 M119A2

    • 61728 Words
    • 488 Pages

    whether patented or not, will be respected, that the recipient will report promptly to the United States, any known or suspected compromise,…

    • 61728 Words
    • 488 Pages
    Better Essays
  • Powerful Essays

    USASOC Pam 25-3, DCSIM User’s Reference Guide. d. USASOC Pam 25-4, Hardware and Software Standards for Desktop and Portable computers. e. USASOC Reg 25-70, ASOCNet Security. f. USASOC Reg 25-71, Redistribution and Reporting Excess Information Mission Area Equipment. g. USASOC Reg 380-3, Malicious Software.…

    • 2469 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Access Control Policy

    • 833 Words
    • 3 Pages

    Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems…

    • 833 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Bananas

    • 344 Words
    • 2 Pages

    2. The data stored in locked drawers, rooms, or areas where access is controlled by a guard, cipher lock, or a card reader is a key area where cryptography is needed as access to these areas must be restricted to any unauthorized personnel. Any secured or guarded restricted area is required to have physical access control measures to allot for protection and to prevent any unauthorized access by anyone not holding the proper credentials to be in the secured area.…

    • 344 Words
    • 2 Pages
    Good Essays